메뉴 건너뛰기




Volumn 5444 LNCS, Issue , 2009, Pages 256-273

Complexity of multi-party computation problems: The case of 2-party symmetric secure function evaluation

Author keywords

[No Author keywords available]

Indexed keywords

MULTIPARTY COMPUTATION; NEW RESULTS; PROTOCOL SIMULATION; SECURE FUNCTION EVALUATION; SECURE PROTOCOLS; SECURITY SETTINGS; SIMPLE PROTOCOL; TECHNICAL TOOLS; UNIVERSALLY COMPOSABLE SECURITY;

EID: 70350679063     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00457-5_16     Document Type: Conference Paper
Times cited : (43)

References (21)
  • 1
    • 38049061524 scopus 로고    scopus 로고
    • Backes, M., Müller-Quade, J., Unruh, D.: On the necessity of rewinding in secure multiparty computation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 157-173. Springer, Heidelberg (2007)
    • Backes, M., Müller-Quade, J., Unruh, D.: On the necessity of rewinding in secure multiparty computation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 157-173. Springer, Heidelberg (2007)
  • 2
    • 33746028196 scopus 로고
    • Perfect privacy for two-party protocols
    • Feigenbaum, J, Merritt, M, eds, American Mathematical Society
    • Beaver, D.: Perfect privacy for two-party protocols. In: Feigenbaum, J., Merritt, M. (eds.) Proceedings of DIMACS Workshop on Distributed Computing and Cryptography, vol. 2, pp. 65-77. American Mathematical Society (1989)
    • (1989) Proceedings of DIMACS Workshop on Distributed Computing and Cryptography , vol.2 , pp. 65-77
    • Beaver, D.1
  • 3
    • 84957064831 scopus 로고    scopus 로고
    • The all-or-nothing nature of two-party secure computation
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Beimel, A., Malkin, T., Micali, S.: The all-or-nothing nature of two-party secure computation. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 80-97. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 80-97
    • Beimel, A.1    Malkin, T.2    Micali, S.3
  • 5
    • 35248854495 scopus 로고    scopus 로고
    • On the limitations of universally composable two-party computation without set-up assumptions
    • Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
    • Canetti, R., Kushilevitz, E., Lindell, Y.: On the limitations of universally composable two-party computation without set-up assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656
    • Canetti, R.1    Kushilevitz, E.2    Lindell, Y.3
  • 6
    • 0024860209 scopus 로고    scopus 로고
    • Chor, B., Kushilevitz, E.: A zero-one law for boolean privacy (extended abstract). In: STOC, pp. 62-72. ACM, New York (1989)
    • Chor, B., Kushilevitz, E.: A zero-one law for boolean privacy (extended abstract). In: STOC, pp. 62-72. ACM, New York (1989)
  • 7
    • 71149116146 scopus 로고    scopus 로고
    • Goldreich, O., Micali, S.,Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM 38(3), 691-729 (1991); Preliminary version in FOCS 1986
    • Goldreich, O., Micali, S.,Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM 38(3), 691-729 (1991); Preliminary version in FOCS 1986
  • 9
    • 51849102397 scopus 로고    scopus 로고
    • Founding cryptography on oblivious transfer - efficiently
    • Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
    • Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer - efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 572-591
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3
  • 10
    • 84898989941 scopus 로고    scopus 로고
    • Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20-31. ACM, New York (1988)
    • Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20-31. ACM, New York (1988)
  • 11
    • 0003931157 scopus 로고
    • PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology
    • Kilian, J.: Uses of Randomness in Algorithms and Protocols. PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (1989)
    • (1989) Uses of Randomness in Algorithms and Protocols
    • Kilian, J.1
  • 12
    • 70350691642 scopus 로고    scopus 로고
    • Kilian, J.: A general completeness theorem for two-party games. In: STOC, pp. 553-560. ACM, New York (1991)
    • Kilian, J.: A general completeness theorem for two-party games. In: STOC, pp. 553-560. ACM, New York (1991)
  • 13
    • 0033706604 scopus 로고    scopus 로고
    • More general completeness theorems for secure two-party computation
    • ACM, New York
    • Kilian, J.: More general completeness theorems for secure two-party computation. In: Proc. 32nd STOC, pp. 316-324. ACM, New York (2000)
    • (2000) Proc. 32nd STOC , pp. 316-324
    • Kilian, J.1
  • 14
    • 0033725451 scopus 로고    scopus 로고
    • Reducibility and completeness in private computations
    • Kilian, J., Kushilevitz, E., Micali, S., Ostrovsky, R.: Reducibility and completeness in private computations. SIAM J. Comput. 29(4), 1189-1208 (2000)
    • (2000) SIAM J. Comput , vol.29 , Issue.4 , pp. 1189-1208
    • Kilian, J.1    Kushilevitz, E.2    Micali, S.3    Ostrovsky, R.4
  • 17
    • 0024768184 scopus 로고    scopus 로고
    • Kushilevitz, E.: Privacy and communication complexity. In: FOCS, pp. 416-421. IEEE, Los Alamitos (1989)
    • Kushilevitz, E.: Privacy and communication complexity. In: FOCS, pp. 416-421. IEEE, Los Alamitos (1989)
  • 18
    • 35048903637 scopus 로고    scopus 로고
    • Lindell, Y.: Lower bounds for concurrent self composition. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 203-222. Springer, Heidelberg (2004)
    • Lindell, Y.: Lower bounds for concurrent self composition. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 203-222. Springer, Heidelberg (2004)
  • 19
    • 70350679063 scopus 로고    scopus 로고
    • Complexity of multiparty computation problems: The case of 2-party symmetric secure function evaluation. Cryptology ePrint Archive
    • Report 2008/454
    • Maji, H., Prabhakaran, M., Rosulek, M.: Complexity of multiparty computation problems: The case of 2-party symmetric secure function evaluation. Cryptology ePrint Archive, Report 2008/454 (2008), http://eprint.iacr.org/
    • (2008)
    • Maji, H.1    Prabhakaran, M.2    Rosulek, M.3
  • 20
    • 51849126899 scopus 로고    scopus 로고
    • Cryptographic complexity of multi-party computation problems: Classifications and separations
    • Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
    • Prabhakaran, M., Rosulek, M.: Cryptographic complexity of multi-party computation problems: Classifications and separations. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 262-279. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 262-279
    • Prabhakaran, M.1    Rosulek, M.2
  • 21
    • 0020312165 scopus 로고
    • Protocols for secure computation
    • IEEE, Los Alamitos
    • Yao, A.C.: Protocols for secure computation. In: Proc. 23rd FOCS, pp. 160-164. IEEE, Los Alamitos (1982)
    • (1982) Proc. 23rd FOCS , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.